Data Communications Chapter 1-3
In a domain, the process of allowing a user to sign on to the network from any computer on the network and get access to resources is managed by what service?
Active Directory Domain Services (AD DS)
When creating network diagrams, what icon description typically represents a network switch?
An icon that is rectangular, which contains 4 arrows pointing in opposite directions.
When creating network diagrams, what icon description typically represents a network firewall?
An icon that resembles a brick wall.
A software patch is a correction, improvement, or enhancement to software.
True
The Presentation layer of the OSI model is responsible for reformatting, compressing, and/or encrypting data in a way that the Application on the receiving end can read
True
In a voice over IP setup (VoIP), what kind of device converts signals from a campus's analog phone equipment into IP data that can travel over a phone company's analog telephone lines?
VoIP gateway
What is the name of the GUI front end that is available for the Nmap utility?
Zenmap
A policy in which all exit doors for a building stay unlocked during a fire is an example of what type of policy?
fail-open
The Data Link Layer utilizes what name for its protocol data unit (PDU)?
frame
A change coordinator functions as what type of manager?
project manager
What type of tool would you utilize to terminate twisted pair wire on a 66 or 110 block?
punchdown tool
What kind of document serves as a legally binding contract or part of a contract that defines, in plain language and measurable terms, the aspect of service provided to a customer?
service-level agreement
When dealing with static electricty, what kind of failure caused by static discharge shortens the life of a component, and can cause intermittent errors?
upset failure
What component of the backbone runs between a building's floors and can be used to connect an MDF and IDF or multiple IDFs?
vertical cross connect
What type of diagram is a graphical representation of a network's wired infrastructure?
wiring schematic
What is a defining characteristic of a bus topology based network?
Devices are daisy-chained together in a single line.
Cable ties should be pulled tightly to keep cables from moving around in a bundle.
False
What is assigned to each node on a network, which is then used by the Network layer to uniquely identify the node?
IP address
Where is a demarc located in relation to the structured cabling of an enterprise environment?
In the Main Distribution Frame (MDF)
What does a statement of work document do?
It documents in detail the work that must be completed for a particular object, and includes specific such as tasks, deliverables, standards, payment schedule, and work timeline.
At what layer of the OSI model does a network switch normally operate?
Layer 2
HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model?
Layer 7
The proper handling procedures for substances such as chemical solvents is typically outlined in which of the following options?
Material Safty Data Sheet (MSDS)
At what layer of the OSI model do the IP, ICMP, and ARP protocols operate?
Network
During termination of twisting pair cabling, what should be done to ensure minimal cross talk is introduced?
No more than 1 inch of cable should be exposed.
In general, how much can a twisted-pair's cable be bent before data transmission may be impeded
No more than 4 times the diameter of the cable.
What federal agency is charged with safety and health in the workplace?
OSHA
In the TCP/IP model, what layer is considered so simple that it is ignored entirely?
Physcial
The Windows Remote Desktop application utilizes what protocol to provide secure, encrypted transmissions?
Remote Desktop Protocol (RDP)
What mail protocol is used to send mail messages to a server?
SMTP
What standard describes uniform, enterprise-wide cabling systems, regardless of who manufactures or sells the various parts used in the system?
TIA/EIA-568
When planning horizontal cabling, what is the maximum allowable distance that can be used?
100 meters
Which of the following is an example of encapsulation?
The addition of a header to data inherited from the layer above in the OSI model.
What does backbone cabling consist of?
The cables or wireless links that provide interconnection between the entrance facility and MDF, and between the MDF and IDFs.
Why should you not leave more than 1 inch of exposed cable before a twisted-pair termination?
The exposure of the cable can cause transmission interference between wires.
What statement accurately reflects what occurs when a message is too large on a network?
The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP).
What occurs if a network layer protocol is aware that a packet is larger than the maximum size for its network?
The packet will be divided into smaller packets using fragmentation.
What is the most popular web server application?
Apache
In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model?
Application
In order to ensure that a cable is not affected by electromagnetic interference, how far away should the cable be from fluorescent lighting?
At least 3 feet